HackDig : Dig high-quality web security articles for hacker

Tor launches Bug Bounty Program, hackers can earn between $2,000 and $4,000 for high severity flaws

The Tor Project announced the launch of a public bug bounty program. Bug hunters can earn between $2,000 and $4,000 for high severity flaws. It’s official, the Tor Project announced the launch of a public bug bounty program through the HackerOne platform, the initiative was possible with support from the Open Technology Fund. “With support from t
Publish At:2017-07-20 22:05 | Read:2033 | Comments:0 | Tags:Breaking News Deep Web Digital ID Hacking anonymity privacy

AlphaBay Market, one of the largest Dark Web marketplaces is down. Is it an Exit-Scam?

The AlphaBay Market went down Tuesday night without any explanation, many users that have purchased products on the marketplace fear the Exit-Scam. The news is shocking, the AlphaBay Market, one of the largest Dark Web black markets is down. We have analyzed many times the popular black market where it was possible to buy any kind of illegal goods, including
Publish At:2017-07-06 08:10 | Read:2631 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web anonymity AphaBay black m

UK.gov accidental data leak. Users’ details left publicly accessible on a third-party site

UK.gov leaves data dashboard users’ details on publicly accessible on a third-party system. Users are urge to reset their password. Are you a user of the UK Government website UK.gov? Change your password now! Users of the government’s data dashboard have been notified that their information was accidentally made public so they urge to change their pas
Publish At:2017-06-30 04:50 | Read:2302 | Comments:0 | Tags:Breaking News Data Breach data breach privacy UK.gov

Three years ago ProtonMail was launched. Today, it is launching ProtonVPN

ProtonMail announced ProtonVPN is now available to the general public. ProtonVPN is officially out of beta. You can now directly get ProtonVPN by visiting https://protonvpn.com After more than 1 year of development, and four months of beta testing by over 10’000 members of the ProtonMail community, we’re finally making ProtonVPN available to everyone. And we
Publish At:2017-06-21 18:15 | Read:3505 | Comments:0 | Tags:Breaking News Digital ID privacy ProtonMail ProtonVPN VPN

In Search of Equilibrium: Compliance and Security

The Moody Blues searched for the “Lost Chord,” Captain Kirk searched for Spock and the “In Search Of” television show sought to solve unexplained mysteries. Similarly, IT and security professionals are always searching for solutions that can balance myriad standards and regulations against a continuously evolving threat landscape. A
Publish At:2017-06-21 17:10 | Read:2309 | Comments:0 | Tags:Data Protection Compliance Data Privacy immune system Privac

The apparent difficulty of implementing email encryption in Gmail

It’s been almost three years since Google first announced its intention to add end-to-end encryption to Gmail. However, the free email service is yet to provide users with that feature. Despite the Internet giant insists that it was never a bluff, one of the company’s latest movements has reignited the criticism. Recently, a spokesperson from Goo
Publish At:2017-06-14 11:50 | Read:3004 | Comments:0 | Tags:Security end-to-end encryption Gmail Google Privacy technolo

Egypt blocks dozens of websites including ‘Medium’ without any official announcement

The Egyptian government blocked a number of websites in Egypt, including the publishing platform Medium, without any official announcement. Egyptians users of the online publishing platform, Medium were not able to access the service from their country. Readers and bloggers using both desktop and mobile app suffered access problems, the reason of the blackou
Publish At:2017-06-12 13:15 | Read:3416 | Comments:0 | Tags:Breaking News Digital ID Terrorism Censorship Egypt Medium p

4 Possible Ways to Make Your Browser Hacker-Proof

Browsers are constantly targeted by hackers. Here are 4 ways you can make your browser hacker-proof. Use them to stay secure on the web. Browsers have long been a hot target of numerous hacking-related incidents. They are the primary source of hacking incidents as we search, share, watch and download files from browsers. Moreover, various vulnerabilities exi
Publish At:2017-06-07 04:20 | Read:4335 | Comments:0 | Tags:Breaking News Digital ID browser hacker-proof Hacking privac

Big Data Control Frameworks: Have Your Data and Control It Too

One of the fundamental requirements for big data users is big data control. Failure to properly store, audit and maintain data chain of custody undermines our individual and collective privacy. This failure also may be at odds with federal law and policy. Without data control, there is no data compliance. Fortunately, there is a host of big data analytics
Publish At:2017-06-01 11:15 | Read:2707 | Comments:0 | Tags:Data Protection Identity & Access Big Data Big Data Analytic

Chrome design flaw allows sites to record Audio/Video without indication

A developer has discovered a flaw in the Chrome browser that could be exploited to secretly Record Audio/Video without indication. The AOL developer Ran Bar-Zik discovered a disconcerting vulnerability in Google’s Chrome browser could be exploited by attackers to record audio or video without giving any visual notification or alert. “After gettin
Publish At:2017-05-31 17:55 | Read:3204 | Comments:0 | Tags:Breaking News Digital ID Hacking Chrome design flaw privacy

With Less Than 1 Year To Go Companies Place Different Priorities on GDPR Compliance

The European General Data Protection Regulation (GDPR) will take effect in one year from now, but a large number of firms are far from prepared. It feels like Y2K all over again. We are less than one year until the impact of the GDPR is realized, no one is certain what will happen, and everyone is taking a different approach to mitigation. In April 2016,
Publish At:2017-05-30 05:10 | Read:2941 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations GDPR Law priva

Goodbye Privacy? The US Has Recently Passed a Bill That Has Everyone Worried

 The US Congress  decided to repeal an Internet privacy regulation passed under the Obama administration. For many, this is unsettling news. Trump has already initialed the controversial repeal, which allows Internet providers to store and sell users’ browsing histories. The previous regulation, however, required these companies to obtain permission fr
Publish At:2017-05-26 18:50 | Read:3307 | Comments:0 | Tags:Security companies data Internet Privacy

Fresh Phish. (So Many Puns, So Little Time.)

Today’s phish blog breaks our format a bit so we can bring you lots of examples. Enjoy. And then get protected! Phishing is prevalent because it works. Even savvy users can be tricked into opening the wrong emails. I’ve seen a couple of clear examples of this recently. The first is one that quite convincingly mimics the invoice emails from a fairly sig
Publish At:2017-05-23 12:10 | Read:3164 | Comments:0 | Tags:Threats apps attachments browsing files humans Isolation Mal

Who is listening? The problem of online microphones

What lurks in our microphones? Microphones play an important part in day-to-day life. We can talk with almost anyone in the world using our smartphones, tablets and laptops. We can even give our in-home smart technology instructions simply by speaking to it. But this power and convenience often means that microphones have to be left switched on – which means
Publish At:2017-05-17 13:40 | Read:2933 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers Privacy

UK Government’s secret programme for mass surveillance on internet and phones leaked

According to a draft document leaked online, UK Government is assigning itself more powers to spy on live communications and use malware for surveillance. While the NSA is announcing it will stop surveillance activities on emails, texts, and other internet communications, the UK government has secretly drawn up more details of its new bulk surveillance power
Publish At:2017-05-07 10:15 | Read:2284 | Comments:0 | Tags:Breaking News Digital ID Intelligence Laws and regulations e


Share high-quality web security related articles with you:)


Tag Cloud